Cybersecurity Lesson 1 & 2 Key Terms

123456789101112131415161718
Across
  1. 4. are the settings on social networks that allow users to control who sees what they post, and they can either be adjusted post by post, or set to a default setting.
  2. 6. where you connect with other players and can chat with them either by voice or by text.
  3. 7. people online that often try to obtain information about you.
  4. 10. a person who witness someone getting bullied but does nothing to stop it.
  5. 11. is short for “internet etiquette” and are the rules for interacting politely online
  6. 12. can be anything from cyberbullying to actual physical harm, if the wrong people get your information.
  7. 15. is a person or people that stand for others that are being bullied either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult.
  8. 16. on the internet is a technical measure intended to restrict access to information.
  9. 18. means that when you update your status, check-in to a location or post a photo, these things are being saved and tracked, both by the company that provide the services and probably by your browser.
Down
  1. 1. is exchange of suggestive messages or images via mobile phone texting.
  2. 2. is the ability to act in a safe and responsible way on the internet and other connected environments.
  3. 3. someone who intentionally targets people for harm using online chat rooms or social media.
  4. 5. is the action of subjecting someone to aggressive pressure or intimidation.
  5. 8. is a site or online community where people with like experiences or interests communicate with each other and share information and resources.
  6. 9. is bullying that takes place using electronic technology.
  7. 13. keeping your personal information safe and personal.
  8. 14. many social networking web sites require you to set up.
  9. 17. is a detailed report, usually about a person.